Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe
-
Size
76KB
-
MD5
0ce0e69ccb9b5c1e856e831c4a663100
-
SHA1
c3fdc562b16baae8f0538668cbe3c493ad5e6715
-
SHA256
ac970a41db8598dbd7db4b2879dc6185f736ff894fa02ca0d957ff6b0ae414e6
-
SHA512
08e055da9ff90848b52d8d5eda184c41e12bdfedae7e6f8bbd67e5f87fbd32befe0deb2d431ddc342d606ae3953f9265b39d81bb26ce40d14dd6d01e004ca904
-
SSDEEP
1536:MvP69lUyW1UwzJmWRaD1gXI7uMrpzrnacxfzZ1:G69lU2UmWVXI7uMlzTFz7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 203212 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/202104-467042-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/202104-467044-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/202104-467047-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/202104-467049-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/202104-467050-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/202104-467092-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\system\\svchost.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2884 set thread context of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 203212 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2884 wrote to memory of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 PID 2884 wrote to memory of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 PID 2884 wrote to memory of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 PID 2884 wrote to memory of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 PID 2884 wrote to memory of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 PID 2884 wrote to memory of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 PID 2884 wrote to memory of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 PID 2884 wrote to memory of 202104 2884 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 30 PID 202104 wrote to memory of 72408 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 31 PID 202104 wrote to memory of 72408 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 31 PID 202104 wrote to memory of 72408 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 31 PID 202104 wrote to memory of 72408 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 31 PID 72408 wrote to memory of 72672 72408 cmd.exe 33 PID 72408 wrote to memory of 72672 72408 cmd.exe 33 PID 72408 wrote to memory of 72672 72408 cmd.exe 33 PID 72408 wrote to memory of 72672 72408 cmd.exe 33 PID 202104 wrote to memory of 203212 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 34 PID 202104 wrote to memory of 203212 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 34 PID 202104 wrote to memory of 203212 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 34 PID 202104 wrote to memory of 203212 202104 0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ce0e69ccb9b5c1e856e831c4a663100_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:202104 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PQMKM.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:72408 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system\svchost.exe" /f4⤵
- Adds Run key to start application
PID:72672
-
-
-
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:203212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD505d958f804a3cb770b18371699915faf
SHA182e91a19f4f23340db8bb5c7d271aa0b590ff723
SHA25661ae6f17d637624fd66d1dfad93a1c6a863aa7caf67d3e267910f4b9212bdf52
SHA5123ff7be267167f2c447e9aeef2f5e84785dd45d08a10738b1b4c1b01b21d3ea29e637ede50b1091211b97fd40ae5b2bea54e053200778228ffde852f8a19ce921
-
Filesize
76KB
MD50ce0e69ccb9b5c1e856e831c4a663100
SHA1c3fdc562b16baae8f0538668cbe3c493ad5e6715
SHA256ac970a41db8598dbd7db4b2879dc6185f736ff894fa02ca0d957ff6b0ae414e6
SHA51208e055da9ff90848b52d8d5eda184c41e12bdfedae7e6f8bbd67e5f87fbd32befe0deb2d431ddc342d606ae3953f9265b39d81bb26ce40d14dd6d01e004ca904
-
Filesize
76KB
MD53c6d35757f261c9782e727ba338ec866
SHA1481f2fe7679b4e796a55863c48577888e6c25e9d
SHA2563ec527c5af129a34d2d63d2e3e26525a79da79ea911e142cbbbb6e6673a00a82
SHA51212c2dbb58abd7607ec5d3b420d3ec26b9aa041d1df2b7124f762a33f0d28b8b27b2620c241beebe4d9c3aee937eb2d083154b9e9adf2960c95eb04479fdf27e1